A novel simulation approach for fault injection resistance evaluation on smart cards

Software Testing, Verification and Validation Workshops(2015)

引用 14|浏览24
暂无评分
摘要
Physical perturbations are performed against embedded systems that can contain valuable data. Such devices and in particular smart cards are targeted because potential attackers hold them. The embedded system security must hold against intentional hardware failures that can result in software errors. In a malicious purpose, an attacker could exploit such errors to find out secret data or disrupt a transaction. Simulation techniques help to point out fault injection vulnerabilities and come at an early stage in the development process. This paper proposes a generic fault injection simulation tool that has the particularity to embed the injection mechanism into the smart card source code. By its embedded nature, the Embedded Fault Simulator (EFS) allows us to perform fault injection simulations and side-channel analyses simultaneously. It makes it possible to achieve combined attacks, multiple fault attacks and to perform backward analyses. We appraise our approach on real, modern and complex smart card systems under data and control flow fault models. We illustrate the EFS capacities by performing a practical combined attack on an Advanced Encryption Standard (AES) implementation.
更多
查看译文
关键词
cryptography,fault simulation,smart cards,aes,efs,advanced encryption standard,backward analyses,complex smart card systems,control flow fault models,embedded fault simulator,fault injection resistance evaluation,fault injection simulations,generic fault injection simulation tool,multiple fault attacks,side-channel analyses,smart card source code,fault injection,physical attack,combined attack,data modification,embedded systems,instruction skip,side-channel attack,smart card,data models,hardware,side channel attack,security,registers
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要